Search alternatives:
implications » applications (Expand Search)
Showing 2,041 - 2,060 results of 64,817 for search 'data (implications OR application)', query time: 0.38s Refine Results
  1. 2041

    Data circulation security governance from the perspective of data socialization: a five-sphere framework by HUANG Keman, XU Duo, DU Xiaoyong

    Published 2024-11-01
    “…The technology system provides secure technical capabilities for data circulation, the industry system fosters industrial ecosystems to promote cost reduction and efficiency improvement, the standards system reduces coordination difficulties by promoting standardization, the policy system constructs policy mechanisms to provide an innovative environment, and the practice system provides demonstration guidelines to promote application. …”
    Get full text
    Article
  2. 2042

    A Robust Enhanced Ensemble Learning Method for Breast Cancer Data Diagnosis on Imbalanced Data by Zhenzhen Wang, Junde Xie, Jia Zhang

    Published 2024-01-01
    “…Addressing class imbalance in breast cancer data is essential for enhancing detection accuracy, yet traditional machine learning methods often overlook this imbalance, limiting their classification performance. …”
    Get full text
    Article
  3. 2043

    Smart tourism technologies and destination perception: implications for revisit intentions in mountainous destinations by Fatima Anjum, Yousaf ALI

    Published 2025-03-01
    “…Additionally, this research examines the role of destination trust and perceived risk in the relationship between perceived destination image and revisit intention. Methodology - The data being utilized involved the accumulation of experience-based survey data from 200 respondents and experts, leading to the application of the partial least square structure equation modeling (PLS-SEM) approach. …”
    Get full text
    Article
  4. 2044

    AI-Enabled personalized learning ecology construction and its implications for prevocational education by Su Qinqin

    Published 2025-01-01
    “…This paper discusses the construction of AI-enabled personalized learning ecology and its implications for pre-professional prospective education. …”
    Get full text
    Article
  5. 2045

    Research Trends in Eye Gaze Tracking and its Implications: A Bibliometric Analysis by BM Prasanna Kumar, KN Sowmya, B Madhushree, HR Chennamma

    Published 2025-05-01
    “…Introduction: Eye gaze tracking is essential in understanding non verbal communication, human-computer interaction and cognitive responses. Its applications range from healthcare to consumer behaviour analysis and gaming. …”
    Get full text
    Article
  6. 2046

    The Semantic Reference Data Modelling Method: Creating Understandable, Reusable and Sustainable Semantic Data Models by George Bruseker, Nicola Carboni, Matthew Fielding, Denitsa Nenova, Thomas Hänsli

    Published 2025-03-01
    “…A case study is used to illustrate the framework’s application in the cultural sector, specifically highlighting the advantages obtained in documentation, data consistency, and external data ingestion. …”
    Get full text
    Article
  7. 2047
  8. 2048

    GDMD: A Disaster Data Hub Fabric the Open Data Network for Disaster Risk Reduction by Juanle Wang, Kun Bu, Xiaodong Min, Qiuyuan Wang, Yuelei Yuan, Feiran Sun

    Published 2025-02-01
    “…The open model of GDMD can realize Findable, Accessible, Interoperable, and Reusable data governance in disaster risk reduction, further pushing the Open Science mechanism and innovative applications of resources.…”
    Get full text
    Article
  9. 2049
  10. 2050

    Key Technology of SSL Encrypted Application Identification Under Imbalance of Application Class by Xuejiao Chen, Pan Wang, Shidong3 Liu

    Published 2015-12-01
    “…Through a in-depth study about the reason of network class imbalance, a method called SMOTE was chosen over the data set sampling preprocess, making full use of the advantages which is high accuracy of traffic model feature matching identification and sorting out the encrypted SSL flow, and then using the clustering method and the SVM based on mutual information classification method to further identify SSL encryption specific application, like HTTPS/POPS etc. …”
    Get full text
    Article
  11. 2051

    Utilization Patterns of the Cultural Centers Among the Youth in Tehran (Implications, Motivations and Functions) by Mahmood Shahabi, Zahra Jafari

    Published 2015-03-01
    “…The main purpose of this study is to identify the application and implications of the Cultural Centers for the youth in Tehran and the motivations and functions resulting from the consumption of these spaces. …”
    Get full text
    Article
  12. 2052

    The Unit Price Implication of Reinforcement Usage in Tie Beam Reinforced Concrete Construction by Mubarak Mubarak, Tripoli Tripoli, Nurisra Nurisra

    Published 2018-04-01
    “…Thus, the use of the standard unit price analysis needs further assessment for proper application.…”
    Get full text
    Article
  13. 2053

    Advancements in digital twin technology and machine learning for energy systems: A comprehensive review of applications in smart grids, renewable energy, and electric vehicle optim... by Opy Das, Muhammad Hamza Zafar, Filippo Sanfilippo, Souman Rudra, Mohan Lal Kolhe

    Published 2024-10-01
    “…DT concepts facilitate the creation of virtual models mirroring physical assets, streamlining real-time data management and analysis. Driven by the potential of DTs to revolutionise energy systems, this paper offers a comprehensive review of DT applications in the power sector, specifically within next-generation energy systems like Smart Grids. …”
    Get full text
    Article
  14. 2054

    Data-Driven Uplift Modeling by Anam Zahid, Faisal Kamiran, Samar Abbas, Bilal Qureshi, Asim Karim

    Published 2025-01-01
    “…Usually, such studies are retrospective in nature rather than controlled experiments; hence, pre-existing bias in the observed data can distort the true effect of treatment. Previous studies on uplift modeling has largely overlooked this bias, focusing instead on model-based solutions for specific applications. …”
    Get full text
    Article
  15. 2055

    Reflections on data network technology by Lintao JIANG

    Published 2020-07-01
    “…The history of data network development and standardization was reviewed,and the idea ofsub-generational development concept for future network was put forward.It was pointed out that there were two technical routes in network design:the development technology route with users and business applications as the core,the gradual increase of network capabilities according to the needs of users and applications,and the development technology route with network as the core and the main body of capacity responsibility.Network 5.0 adopts “network as the core design concept”.A detailed description of three important capabilities of network 5.0 was given:endogenous credibility and security,endogenous network resource perception,deployment and control,and endogenous network certainty.…”
    Get full text
    Article
  16. 2056
  17. 2057
  18. 2058
  19. 2059

    OPEN DATA: ANALYSIS OF TRENDS by D. A. Kachan

    Published 2018-05-01
    “…The analysis of the applicability of the world experience on data discovery for the Republic of Belarus was conducted, the topical issues of ensuring the proper level of information protection when publishing data sets were discussed, effective ways of using open data were suggested, and the importance of ensuring sufficient regulatory regulation was noted. …”
    Get full text
    Article
  20. 2060

    DRONES, PRIVACY AND DATA PROTECTION by Andrei-Alexandru STOICA

    Published 2021-05-01
    “…To identify the key issues, the paper will take into account major incidents that took place regarding breaches of data privacy, while also trying to distinguish how international law is applicable. …”
    Get full text
    Article